DragonFly On-Line Manual Pages
RSPAMC(1) RSPAMC(1)
NAME
rspamc - rspamd command line client
SYNOPSIS
rspamc [options] [command] [input-file]...
rspamc -help
DESCRIPTION
rspamc is a simple rspamd client, primarily for classifying or learning
messages. rspamc supports the following commands:
o Scan commands:
o symbols: scan message and show symbols (default command)
o Control commands
o learn_spam: learn message as spam
o learn_ham: learn message as ham
o fuzzy_add: add message to fuzzy storage (check -f and -w options
for this command)
o fuzzy_del: delete message from fuzzy storage (check -f option for
this command)
o stat: show rspamd statistics
o stat_reset: show and reset rspamd statistics (useful for graphs)
o counters: display rspamd symbols statistics
o uptime: show rspamd uptime
o add_symbol: add or modify symbol settings in rspamd
o add_action: add or modify action settings
Control commands that modify rspamd state are considered privileged and
require a password to be specified with the -P option (see OPTIONS,
below, for details).
This depends on a controller's settings and is discussed in the
rspamd-workers page (see SEE ALSO, below, for details).
Input files may be either regular file(s) or a directory to scan. If
no files are specified rspamc reads from the standard input.
Controller commands usually do not accept any input, however learn* and
fuzzy* commands requires input.
OPTIONS
-h host[:port], --connect=host[:port]
Specify host and port
-P password, --password=password
Specify control password
-c name, --classifier=name
Classifier to learn spam or ham (bayes is used by default)
-w weight, --weight=weight
Weight for fuzzy operations
-f number, --flag=number
Flag for fuzzy operations
-p, --pass
Pass all filters
-v, --verbose
More verbose output
-i ip address, --ip=ip address
Emulate that message was received from specified ip address
-u username, --user=username
Emulate that message was received from specified authenticated
user
-d user@domain, --deliver=user@domain
Emulate that message was delivered to specified user (for
LDA/statistics)
-F user@domain, --from=user@domain
Emulate that message has specified SMTP FROM address
-r user@domain, --rcpt=user@domain
Emulate that message has specified SMTP RCPT address
--helo=helo_string
Imitate SMTP HELO passing from MTA
--hostname=hostname
Imitate hostname passing from MTA (rspamd assumes that it is
verified by MTA)
-t seconds, --timeout=seconds
Timeout for waiting for a reply (can be floating point number,
e.g. 0.1)
-b host:port, --bind=host:port
Bind to specified ip address
-R, --human
Output human readable report. The first line of the output
contains the message score and three threshold scores, in this
format:
score/greylist/addheader/reject,action=N:ACTION,spam=0|1,skipped=0|1
-j, --json
Output formatted JSON
--ucl Output UCL
--raw Output raw data received from rspamd (compacted JSON)
--headers
Output HTTP headers from a reply
--extended-urls
Output URLs in an extended format, showing full URL, host and
the part of host that was used by surbl module (if enabled).
-n parallel_count, --max-requests=parallel_count
Maximum number of requests to rspamd executed in parallel (8 by
default)
-e command, --execute=command
Execute the specified command with either mime output (if mime
option is also specified) or formatted rspamd output
--mime Output the full mime message instead of scanning results only
--header=header
Add custom HTTP header for a request. You may specify header in
format name=value or just name for an empty header. This option
can be repeated multiple times.
--sort=type
Sort output according to a specific field. For counters command
the allowed values for this key are name, weight, frequency and
hits. Appending :desc to any of these types inverts sorting
order.
--commands
List available commands
RETURN VALUE
On exit rspamc returns 0 if operation was successful and an error code
otherwise.
EXAMPLES
Check stdin:
rspamc < some_file
Check files:
rspamc symbols file1 file2 file3
Learn files:
rspamc -P pass learn_spam file1 file2 file3
Add fuzzy hash to set 2:
rspamc -P pass -f 2 -w 10 fuzzy_add file1 file2
Delete fuzzy hash from other server:
rspamc -P pass -h hostname:11334 -f 2 fuzzy_del file1 file2
Get statistics:
rspamc stat
Get uptime:
rspamc uptime
Add custom rule's weight:
rspamc add_symbol test 1.5
Add custom action's weight:
rspamc add_action reject 7.1
SEE ALSO
Rspamd documentation and source code may be downloaded from
<https://rspamd.com/>.
Rspamd User Manual RSPAMC(1)